Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exe
Analysis ID:1501346
MD5:92ffd2b619edc0df4985b45b88f308fb
SHA1:c252f21a00337ba4f62849bdea4c5b61bfb845e6
SHA256:f0959211c721df0d3d56cdf27cd75fc58f3de23e6de15e070dc6aa1d007d3e2c
Tags:exe
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Detected VMProtect packer
Machine Learning detection for sample
Contains functionality for execution timing, often used to detect debuggers
Entry point lies outside standard sections
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeAvira: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeReversingLabs: Detection: 52%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.9% probability
Source: SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: unknownDNS traffic detected: query: 56.126.166.20.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 56.126.166.20.in-addr.arpa

System Summary

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeStatic PE information: .vmp0 and .vmp1 section names
Source: classification engineClassification label: mal68.winEXE@2/0@1/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4800:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeReversingLabs: Detection: 52%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: d3dcompiler_43.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeSection loaded: vcruntime140.dllJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeStatic file information: File size 6510080 > 1048576
Source: SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x634e00
Source: SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeStatic PE information: section name: .vmp0
Source: SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeStatic PE information: section name: .vmp1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeCode function: 0_2_00007FF68FA37DFD rdtsc 0_2_00007FF68FA37DFD
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exeCode function: 0_2_00007FF68FA37DFD rdtsc 0_2_00007FF68FA37DFD
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exe53%ReversingLabsWin64.Trojan.Generic
SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exe100%AviraHEUR/AGEN.1315472
SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
56.126.166.20.in-addr.arpa
unknown
unknownfalse
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1501346
    Start date and time:2024-08-29 19:23:30 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 46s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exe
    Detection:MAL
    Classification:mal68.winEXE@2/0@1/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 1
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exe, PID 7084 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (console) x86-64, for MS Windows
    Entropy (8bit):7.9241989504404735
    TrID:
    • Win64 Executable Console (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exe
    File size:6'510'080 bytes
    MD5:92ffd2b619edc0df4985b45b88f308fb
    SHA1:c252f21a00337ba4f62849bdea4c5b61bfb845e6
    SHA256:f0959211c721df0d3d56cdf27cd75fc58f3de23e6de15e070dc6aa1d007d3e2c
    SHA512:01a9349a9ab662ba016cc9a9b7cf0cda2b481acc207065a86d96ca9537670af328d61395059aca40bdf620d7062001a8519bf8537be5cc7c87b48fc90e90f850
    SSDEEP:196608:Oxh8eBj9ID2uw0V+Kg7IJsoRVsIM1WDrRLZ:Or8Ej9IqH0rg7IJZ7L
    TLSH:EB6622A96248331CC42AC5B49523FD4AB2B6931E4FE498AE71DBBFC077DB425D502F06
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f.........."....&..............X........@..........................................`................................
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x14058a390
    Entrypoint Section:.vmp1
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x66C30317 [Mon Aug 19 08:32:23 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:e6d53cdbe5738a4e052e19ec48e5fd4c
    Instruction
    push 07B54780h
    call 00007FE0FD8268C8h
    cmp dword ptr [edx+19FF39CEh], esi
    mov cl, D0h
    sbb edi, ecx
    ret
    fstcw word ptr [eax]
    inc esp
    jle 00007FE0FD358EAFh
    or al, dh
    mov dl, C3h
    mov bh, F7h
    lahf
    dec ebx
    into
    cmp byte ptr [94926AA6h], ah
    and al, C9h
    or eax, F824DD4Bh
    pushfd
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x57bad00xc4f.vmp1
    IMAGE_DIRECTORY_ENTRY_IMPORT0x6f5fb80x2bc.vmp1
    IMAGE_DIRECTORY_ENTRY_RESOURCE0xbae0000x1e0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0xb9d1700xfc54.vmp1
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0xbad0000xd4.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x6df2680x30.vmp1
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb9d0300x140.vmp1
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0xa4a0000x280.vmp1
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x12d5a00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x12f0000x4a46c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x17a0000x739800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x1ee0000xcef40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .vmp00x1fb0000x37c72d0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .vmp10x5780000x634dc40x634e009ce19d1b8461d28343ab30ef36f79fe8unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .reloc0xbad0000xd40x2009435a14cddab362eedd509ac36ee850aFalse0.34375GLS_BINARY_LSB_FIRST2.056338576646308IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0xbae0000x1e00x2000ffd06f4da76e978c666896d0f44b7adFalse0.541015625data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_MANIFEST0xbae0580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
    DLLImport
    d3d11.dllD3D11CreateDeviceAndSwapChain
    D3DCOMPILER_43.dllD3DCompile
    KERNEL32.dllHeapFree
    USER32.dllSetCapture
    SHELL32.dllShellExecuteW
    MSVCP140.dll?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
    dwmapi.dllDwmExtendFrameIntoClientArea
    urlmon.dllURLDownloadToFileA
    IMM32.dllImmSetCompositionWindow
    Normaliz.dllIdnToAscii
    WLDAP32.dll
    CRYPT32.dllCertGetCertificateChain
    WS2_32.dllhtons
    RPCRT4.dllRpcStringFreeA
    PSAPI.DLLGetModuleInformation
    USERENV.dllUnloadUserProfile
    VCRUNTIME140_1.dll__CxxFrameHandler4
    VCRUNTIME140.dll__current_exception_context
    api-ms-win-crt-runtime-l1-1-0.dllstrerror
    api-ms-win-crt-stdio-l1-1-0.dll_read
    api-ms-win-crt-heap-l1-1-0.dllfree
    api-ms-win-crt-utility-l1-1-0.dllsrand
    api-ms-win-crt-math-l1-1-0.dll_dclass
    api-ms-win-crt-string-l1-1-0.dllstrncmp
    api-ms-win-crt-convert-l1-1-0.dllstrtod
    api-ms-win-crt-filesystem-l1-1-0.dll_access
    api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
    api-ms-win-crt-time-l1-1-0.dll_gmtime64
    ADVAPI32.dllOpenProcessToken
    WTSAPI32.dllWTSSendMessageW
    KERNEL32.dllGetSystemTimeAsFileTime
    USER32.dllGetUserObjectInformationW
    KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
    USER32.dllGetProcessWindowStation, GetUserObjectInformationW
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Aug 29, 2024 19:25:17.129067898 CEST5349532162.159.36.2192.168.2.10
    Aug 29, 2024 19:25:17.720979929 CEST5116753192.168.2.101.1.1.1
    Aug 29, 2024 19:25:17.728801012 CEST53511671.1.1.1192.168.2.10
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Aug 29, 2024 19:25:17.720979929 CEST192.168.2.101.1.1.10x9491Standard query (0)56.126.166.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Aug 29, 2024 19:25:17.728801012 CEST1.1.1.1192.168.2.100x9491Name error (3)56.126.166.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:13:24:44
    Start date:29/08/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.24697.14860.exe"
    Imagebase:0x7ff68efe0000
    File size:6'510'080 bytes
    MD5 hash:92FFD2B619EDC0DF4985B45B88F308FB
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:1
    Start time:13:24:44
    Start date:29/08/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff620390000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Reset < >
      Memory Dump Source
      • Source File: 00000000.00000002.2728727527.00007FF68FA2B000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF68EFE0000, based on PE: true
      • Associated: 00000000.00000002.2728266807.00007FF68EFE0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2728330760.00007FF68F558000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2728711628.00007FF68FA2A000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2728820455.00007FF68FB8D000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff68efe0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8cb8630c7389adbd835427c8e05d4ce512002edd008b64f8a911163a2a1939b1
      • Instruction ID: f340003ced8d06861a905a038bf7a01e9f8d0b851bbac1f824356774c8e96545
      • Opcode Fuzzy Hash: 8cb8630c7389adbd835427c8e05d4ce512002edd008b64f8a911163a2a1939b1
      • Instruction Fuzzy Hash: ADF02286618934F8E916404B2EC8EF892D7BB40BC2F258429FC8D036D4DF7CE8007164